Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7gj7-224w-vpr3

Опубликовано: 14 июл. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Spring-boot-admin sandbox bypass via crafted HTML

Thymeleaf through 3.1.1.RELEASE as used in spring-boot-admin (aka Spring Boot Admin) through 3.1.1 allows for a sandbox bypass via crafted HTML. This may be relevant for SSTI (Server Side Template Injection) and code execution in spring-boot-admin if MailNotifier is enabled and there is write access to environment variables via the UI.

Spring Boot Admin 3.1.2 and 2.7.16 contain mitigations for the issue. This bypass is achived via a library called Thymeleaf which has added counter measures for this sort of bypass in version 3.1.2.RELEASE which has explicity forbidden static access to org.springframework.util in expressions. Thymeleaf itself should not be considered vulnerable.

Пакеты

Наименование

de.codecentric:spring-boot-admin-server

maven
Затронутые версииВерсия исправления

>= 3.0.0, < 3.1.2

3.1.2

Наименование

de.codecentric:spring-boot-admin-server

maven
Затронутые версииВерсия исправления

< 2.7.16

2.7.16

EPSS

Процентиль: 40%
0.00185
Низкий

7.5 High

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 7.5
nvd
больше 2 лет назад

Thymeleaf through 3.1.1.RELEASE, as used in spring-boot-admin (aka Spring Boot Admin) through 3.1.1 and other products, allows sandbox bypass via crafted HTML. This may be relevant for SSTI (Server Side Template Injection) and code execution in spring-boot-admin if MailNotifier is enabled and there is write access to environment variables via the UI.

EPSS

Процентиль: 40%
0.00185
Низкий

7.5 High

CVSS3

Дефекты

CWE-77